Buy brazilyellowpages.com ?

Products related to Incident:


  • Acronis Cyber Protect Standard Windows Server Essentials
    Acronis Cyber Protect Standard Windows Server Essentials

    Acronis Cyber Protect Standard Windows Server Essentials lets you back up Windows Server Foundation and Essentials (and older SBS versions), including applications running on them. The version is not suitable for Windows Server Standard and Datacenter. Cyber Protect Standard Edition provides the standard backup features plus comprehensive cyber protection features (including Continuous Protection, Data Protection Map, HDD monitoring). Includes 150 GB of cloud storage per license. Acronis Cyber Protect Standard Windows Server Essentials buying points Cyber Security and Endpoint Protection Endpoint protection management including vulnerability assessment and patch management, remote desktop and drive status checks. Malware Protection Comprehensive AI-based next-generation malware protection, including URL filtering and automated backup scanning. Backup and recovery Fast and reliable recovery for your applications, systems and data on all devices to protect against any incident. Features of Acronis Cyber Protect Standard Windows Server Essentials Windows Server Essentials and Foundation backup Bare metal and granular recovery of individual elements of Windows Server (2012/2012R2/2016) Foundation and Essentials, as well as older Windows Small Business Server editions (2003/2003R2/2008/2011). Microsoft Exchange, SQL, SharePoint and Active Directory backup Supports backup of running Exchange, SQL, SharePoint and Active Directory databases. Backup to local disks, NAS and SAN Supports backups to local disks or network-based storage systems (NAS, SAN). Acronis Universal Restore Restore Windows systems to different platforms (other hardware, hypervisor, cloud). Acronis Active Protection Detects suspicious changes to data, backups and Acronis agents. These are blocked and reset. This protects data and systems from ransomware attacks. Variable block size deduplication Built-in deduplication reduces storage consumption and/or network traffic. Bare Metal Recovery Restore complete systems from an image backup, without rebooting the operating system, installing programs, configuring settings, etc. Intelligent Backup Schedule Automatically adjusts patch, scan and backup processes to current CPOC messages. Continuous Data Protection (CDP) Prevent even the smallest data loss in critical applications with Continuous Data Protection (CDP). Failsafe Patching Automatically backup endpoints before installing patches for immediate rollback. Data Protection Card Monitor the protection status of files using classification, reporting and analysis of unstructured data. Acronis Cyber Protect editions comparison Features Essentials Standard Advanced Backup Advanced Data Protection File level backup ✔️ ✔️ ✔️ ✔️ Image-based backup ✔️ ✔️ ✔️ Local backup ✔️ ✔️ ✔️ ✔️ Mobile backup ✔️ ✔️ Cloud deployment only NAS/share backup ✔️ ✔️ ✔️ Incremental/differential backups ✔️ ✔️ ✔️ ✔️ Backup Window (traffic throttling) ✔️ ✔️ ✔️ Multi-target backups (backup replication) ✔️ ✔️ ✔️ Archive compression ✔️ ✔️ ✔️ Backup validation (checksums) ✔️ ✔️ ✔️ Retention rules ✔️ ✔️ ✔️ Blockchain backup notarization ✔️ ✔️ Bare Metal Recovery (BMR) ✔️ ✔️ ✔️ BMR on dissimilar hardware (universal restore), P2V, V2P, V2V ✔️ ✔️ ✔️ XenServer, KVM, RHV, Oracle VM Server ✔️ ✔️ Cybersecurity Protection against ransomware and cryptojacking ✔️ ✔️ ✔️ ✔️ Antivirus and anti-malware protection ✔️ ✔️ ✔️ Exploit prevention ✔️ ✔️ URL filtering ✔️ ✔️ ✔️ URL filtering with categorization ✔️ ✔️ Windows Defender antivirus management ✔️ ✔️ ✔️ Managing Microsoft Security Essentials ✔️ ✔️ ✔️ Threat Alerts ✔️ ✔️ ✔️ Remote deletion of devices ✔️ ✔️ ✔️ Hard disk condition monitoring ✔️ ✔️ Data protection map ✔️ ✔️ Continuous data backup ✔️ Forensic backup ✔️ Secure restoration of backups ✔️ Enterprise Approval List ✔️ Vulnerability assessments for Windows ✔️ ✔️ ✔️ ✔️ Vulnerability assessments for third-party Windows applications ✔️ ✔️ ✔️ ✔️ Vulnerability assessments for macOS ✔️ ✔...

    Price: 346.86 £ | Shipping*: 0.00 £
  • Acronis Cyber Protect Standard Windows Server Essentials
    Acronis Cyber Protect Standard Windows Server Essentials

    Acronis Cyber Protect Standard Windows Server Essentials lets you back up Windows Server Foundation and Essentials (and older SBS versions), including applications running on them. The version is not suitable for Windows Server Standard and Datacenter. Cyber Protect Standard Edition provides the standard backup features plus comprehensive cyber protection features (including Continuous Protection, Data Protection Map, HDD monitoring). Includes 150 GB of cloud storage per license. Acronis Cyber Protect Standard Windows Server Essentials buying points Cyber Security and Endpoint Protection Endpoint protection management including vulnerability assessment and patch management, remote desktop and drive status checks. Malware Protection Comprehensive AI-based next-generation malware protection, including URL filtering and automated backup scanning. Backup and recovery Fast and reliable recovery for your applications, systems and data on all devices to protect against any incident. Features of Acronis Cyber Protect Standard Windows Server Essentials Windows Server Essentials and Foundation backup Bare metal and granular recovery of individual elements of Windows Server (2012/2012R2/2016) Foundation and Essentials, as well as older Windows Small Business Server editions (2003/2003R2/2008/2011). Microsoft Exchange, SQL, SharePoint and Active Directory backup Supports backup of running Exchange, SQL, SharePoint and Active Directory databases. Backup to local disks, NAS and SAN Supports backups to local disks or network-based storage systems (NAS, SAN). Acronis Universal Restore Restore Windows systems to different platforms (other hardware, hypervisor, cloud). Acronis Active Protection Detects suspicious changes to data, backups and Acronis agents. These are blocked and reset. This protects data and systems from ransomware attacks. Variable block size deduplication Built-in deduplication reduces storage consumption and/or network traffic. Bare Metal Recovery Restore complete systems from an image backup, without rebooting the operating system, installing programs, configuring settings, etc. Intelligent Backup Schedule Automatically adjusts patch, scan and backup processes to current CPOC messages. Continuous Data Protection (CDP) Prevent even the smallest data loss in critical applications with Continuous Data Protection (CDP). Failsafe Patching Automatically backup endpoints before installing patches for immediate rollback. Data Protection Card Monitor the protection status of files using classification, reporting and analysis of unstructured data. Acronis Cyber Protect editions comparison Features Essentials Standard Advanced Backup Advanced Data Protection File level backup ✔️ ✔️ ✔️ ✔️ Image-based backup ✔️ ✔️ ✔️ Local backup ✔️ ✔️ ✔️ ✔️ Mobile backup ✔️ ✔️ Cloud deployment only NAS/share backup ✔️ ✔️ ✔️ Incremental/differential backups ✔️ ✔️ ✔️ ✔️ Backup Window (traffic throttling) ✔️ ✔️ ✔️ Multi-target backups (backup replication) ✔️ ✔️ ✔️ Archive compression ✔️ ✔️ ✔️ Backup validation (checksums) ✔️ ✔️ ✔️ Retention rules ✔️ ✔️ ✔️ Blockchain backup notarization ✔️ ✔️ Bare Metal Recovery (BMR) ✔️ ✔️ ✔️ BMR on dissimilar hardware (universal restore), P2V, V2P, V2V ✔️ ✔️ ✔️ XenServer, KVM, RHV, Oracle VM Server ✔️ ✔️ Cybersecurity Protection against ransomware and cryptojacking ✔️ ✔️ ✔️ ✔️ Antivirus and anti-malware protection ✔️ ✔️ ✔️ Exploit prevention ✔️ ✔️ URL filtering ✔️ ✔️ ✔️ URL filtering with categorization ✔️ ✔️ Windows Defender antivirus management ✔️ ✔️ ✔️ Managing Microsoft Security Essentials ✔️ ✔️ ✔️ Threat Alerts ✔️ ✔️ ✔️ Remote deletion of devices ✔️ ✔️ ✔️ Hard disk condition monitoring ✔️ ✔️ Data protection map ✔️ ✔️ Continuous data backup ✔️ Forensic backup ✔️ Secure restoration of backups ✔️ Enterprise Approval List ✔️ Vulnerability assessments for Windows ✔️ ✔️ ✔️ ✔️ Vulnerability assessments for third-party Windows applications ✔️ ✔️ ✔️ ✔️ Vulnerability assessments for macOS ✔️ ✔...

    Price: 541.98 £ | Shipping*: 0.00 £
  • Acronis Cyber Protect Standard Windows Server Essentials
    Acronis Cyber Protect Standard Windows Server Essentials

    Acronis Cyber Protect Standard Windows Server Essentials lets you back up Windows Server Foundation and Essentials (and older SBS versions), including applications running on them. The version is not suitable for Windows Server Standard and Datacenter. Cyber Protect Standard Edition provides the standard backup features plus comprehensive cyber protection features (including Continuous Protection, Data Protection Map, HDD monitoring). Includes 150 GB of cloud storage per license. Acronis Cyber Protect Standard Windows Server Essentials buying points Cyber Security and Endpoint Protection Endpoint protection management including vulnerability assessment and patch management, remote desktop and drive status checks. Malware Protection Comprehensive AI-based next-generation malware protection, including URL filtering and automated backup scanning. Backup and recovery Fast and reliable recovery for your applications, systems and data on all devices to protect against any incident. Features of Acronis Cyber Protect Standard Windows Server Essentials Windows Server Essentials and Foundation backup Bare metal and granular recovery of individual elements of Windows Server (2012/2012R2/2016) Foundation and Essentials, as well as older Windows Small Business Server editions (2003/2003R2/2008/2011). Microsoft Exchange, SQL, SharePoint and Active Directory backup Supports backup of running Exchange, SQL, SharePoint and Active Directory databases. Backup to local disks, NAS and SAN Supports backups to local disks or network-based storage systems (NAS, SAN). Acronis Universal Restore Restore Windows systems to different platforms (other hardware, hypervisor, cloud). Acronis Active Protection Detects suspicious changes to data, backups and Acronis agents. These are blocked and reset. This protects data and systems from ransomware attacks. Variable block size deduplication Built-in deduplication reduces storage consumption and/or network traffic. Bare Metal Recovery Restore complete systems from an image backup, without rebooting the operating system, installing programs, configuring settings, etc. Intelligent Backup Schedule Automatically adjusts patch, scan and backup processes to current CPOC messages. Continuous Data Protection (CDP) Prevent even the smallest data loss in critical applications with Continuous Data Protection (CDP). Failsafe Patching Automatically backup endpoints before installing patches for immediate rollback. Data Protection Card Monitor the protection status of files using classification, reporting and analysis of unstructured data. Acronis Cyber Protect editions comparison Features Essentials Standard Advanced Backup Advanced Data Protection File level backup ✔️ ✔️ ✔️ ✔️ Image-based backup ✔️ ✔️ ✔️ Local backup ✔️ ✔️ ✔️ ✔️ Mobile backup ✔️ ✔️ Cloud deployment only NAS/share backup ✔️ ✔️ ✔️ Incremental/differential backups ✔️ ✔️ ✔️ ✔️ Backup Window (traffic throttling) ✔️ ✔️ ✔️ Multi-target backups (backup replication) ✔️ ✔️ ✔️ Archive compression ✔️ ✔️ ✔️ Backup validation (checksums) ✔️ ✔️ ✔️ Retention rules ✔️ ✔️ ✔️ Blockchain backup notarization ✔️ ✔️ Bare Metal Recovery (BMR) ✔️ ✔️ ✔️ BMR on dissimilar hardware (universal restore), P2V, V2P, V2V ✔️ ✔️ ✔️ XenServer, KVM, RHV, Oracle VM Server ✔️ ✔️ Cybersecurity Protection against ransomware and cryptojacking ✔️ ✔️ ✔️ ✔️ Antivirus and anti-malware protection ✔️ ✔️ ✔️ Exploit prevention ✔️ ✔️ URL filtering ✔️ ✔️ ✔️ URL filtering with categorization ✔️ ✔️ Windows Defender antivirus management ✔️ ✔️ ✔️ Managing Microsoft Security Essentials ✔️ ✔️ ✔️ Threat Alerts ✔️ ✔️ ✔️ Remote deletion of devices ✔️ ✔️ ✔️ Hard disk condition monitoring ✔️ ✔️ Data protection map ✔️ ✔️ Continuous data backup ✔️ Forensic backup ✔️ Secure restoration of backups ✔️ Enterprise Approval List ✔️ Vulnerability assessments for Windows ✔️ ✔️ ✔️ ✔️ Vulnerability assessments for third-party Windows applications ✔️ ✔️ ✔️ ✔️ Vulnerability assessments for macOS ✔️ ✔...

    Price: 541.98 £ | Shipping*: 0.00 £
  • Acronis Cyber Protect Standard Windows Server Essentials
    Acronis Cyber Protect Standard Windows Server Essentials

    Acronis Cyber Protect Standard Windows Server Essentials lets you back up Windows Server Foundation and Essentials (and older SBS versions), including applications running on them. The version is not suitable for Windows Server Standard and Datacenter. Cyber Protect Standard Edition provides the standard backup features plus comprehensive cyber protection features (including Continuous Protection, Data Protection Map, HDD monitoring). Includes 150 GB of cloud storage per license. Acronis Cyber Protect Standard Windows Server Essentials buying points Cyber Security and Endpoint Protection Endpoint protection management including vulnerability assessment and patch management, remote desktop and drive status checks. Malware Protection Comprehensive AI-based next-generation malware protection, including URL filtering and automated backup scanning. Backup and recovery Fast and reliable recovery for your applications, systems and data on all devices to protect against any incident. Features of Acronis Cyber Protect Standard Windows Server Essentials Windows Server Essentials and Foundation backup Bare metal and granular recovery of individual elements of Windows Server (2012/2012R2/2016) Foundation and Essentials, as well as older Windows Small Business Server editions (2003/2003R2/2008/2011). Microsoft Exchange, SQL, SharePoint and Active Directory backup Supports backup of running Exchange, SQL, SharePoint and Active Directory databases. Backup to local disks, NAS and SAN Supports backups to local disks or network-based storage systems (NAS, SAN). Acronis Universal Restore Restore Windows systems to different platforms (other hardware, hypervisor, cloud). Acronis Active Protection Detects suspicious changes to data, backups and Acronis agents. These are blocked and reset. This protects data and systems from ransomware attacks. Variable block size deduplication Built-in deduplication reduces storage consumption and/or network traffic. Bare Metal Recovery Restore complete systems from an image backup, without rebooting the operating system, installing programs, configuring settings, etc. Intelligent Backup Schedule Automatically adjusts patch, scan and backup processes to current CPOC messages. Continuous Data Protection (CDP) Prevent even the smallest data loss in critical applications with Continuous Data Protection (CDP). Failsafe Patching Automatically backup endpoints before installing patches for immediate rollback. Data Protection Card Monitor the protection status of files using classification, reporting and analysis of unstructured data. Acronis Cyber Protect editions comparison Features Essentials Standard Advanced Backup Advanced Data Protection File level backup ✔️ ✔️ ✔️ ✔️ Image-based backup ✔️ ✔️ ✔️ Local backup ✔️ ✔️ ✔️ ✔️ Mobile backup ✔️ ✔️ Cloud deployment only NAS/share backup ✔️ ✔️ ✔️ Incremental/differential backups ✔️ ✔️ ✔️ ✔️ Backup Window (traffic throttling) ✔️ ✔️ ✔️ Multi-target backups (backup replication) ✔️ ✔️ ✔️ Archive compression ✔️ ✔️ ✔️ Backup validation (checksums) ✔️ ✔️ ✔️ Retention rules ✔️ ✔️ ✔️ Blockchain backup notarization ✔️ ✔️ Bare Metal Recovery (BMR) ✔️ ✔️ ✔️ BMR on dissimilar hardware (universal restore), P2V, V2P, V2V ✔️ ✔️ ✔️ XenServer, KVM, RHV, Oracle VM Server ✔️ ✔️ Cybersecurity Protection against ransomware and cryptojacking ✔️ ✔️ ✔️ ✔️ Antivirus and anti-malware protection ✔️ ✔️ ✔️ Exploit prevention ✔️ ✔️ URL filtering ✔️ ✔️ ✔️ URL filtering with categorization ✔️ ✔️ Windows Defender antivirus management ✔️ ✔️ ✔️ Managing Microsoft Security Essentials ✔️ ✔️ ✔️ Threat Alerts ✔️ ✔️ ✔️ Remote deletion of devices ✔️ ✔️ ✔️ Hard disk condition monitoring ✔️ ✔️ Data protection map ✔️ ✔️ Continuous data backup ✔️ Forensic backup ✔️ Secure restoration of backups ✔️ Enterprise Approval List ✔️ Vulnerability assessments for Windows ✔️ ✔️ ✔️ ✔️ Vulnerability assessments for third-party Windows applications ✔️ ✔️ ✔️ ✔️ Vulnerability assessments for macOS ✔️ ✔...

    Price: 173.41 £ | Shipping*: 0.00 £
  • Acronis Cyber Protect Standard Windows Server Essentials
    Acronis Cyber Protect Standard Windows Server Essentials

    Acronis Cyber Protect Standard Windows Server Essentials lets you back up Windows Server Foundation and Essentials (and older SBS versions), including applications running on them. The version is not suitable for Windows Server Standard and Datacenter. Cyber Protect Standard Edition provides the standard backup features plus comprehensive cyber protection features (including Continuous Protection, Data Protection Map, HDD monitoring). Includes 150 GB of cloud storage per license. Acronis Cyber Protect Standard Windows Server Essentials buying points Cyber Security and Endpoint Protection Endpoint protection management including vulnerability assessment and patch management, remote desktop and drive status checks. Malware Protection Comprehensive AI-based next-generation malware protection, including URL filtering and automated backup scanning. Backup and recovery Fast and reliable recovery for your applications, systems and data on all devices to protect against any incident. Features of Acronis Cyber Protect Standard Windows Server Essentials Windows Server Essentials and Foundation backup Bare metal and granular recovery of individual elements of Windows Server (2012/2012R2/2016) Foundation and Essentials, as well as older Windows Small Business Server editions (2003/2003R2/2008/2011). Microsoft Exchange, SQL, SharePoint and Active Directory backup Supports backup of running Exchange, SQL, SharePoint and Active Directory databases. Backup to local disks, NAS and SAN Supports backups to local disks or network-based storage systems (NAS, SAN). Acronis Universal Restore Restore Windows systems to different platforms (other hardware, hypervisor, cloud). Acronis Active Protection Detects suspicious changes to data, backups and Acronis agents. These are blocked and reset. This protects data and systems from ransomware attacks. Variable block size deduplication Built-in deduplication reduces storage consumption and/or network traffic. Bare Metal Recovery Restore complete systems from an image backup, without rebooting the operating system, installing programs, configuring settings, etc. Intelligent Backup Schedule Automatically adjusts patch, scan and backup processes to current CPOC messages. Continuous Data Protection (CDP) Prevent even the smallest data loss in critical applications with Continuous Data Protection (CDP). Failsafe Patching Automatically backup endpoints before installing patches for immediate rollback. Data Protection Card Monitor the protection status of files using classification, reporting and analysis of unstructured data. Acronis Cyber Protect editions comparison Features Essentials Standard Advanced Backup Advanced Data Protection File level backup ✔️ ✔️ ✔️ ✔️ Image-based backup ✔️ ✔️ ✔️ Local backup ✔️ ✔️ ✔️ ✔️ Mobile backup ✔️ ✔️ Cloud deployment only NAS/share backup ✔️ ✔️ ✔️ Incremental/differential backups ✔️ ✔️ ✔️ ✔️ Backup Window (traffic throttling) ✔️ ✔️ ✔️ Multi-target backups (backup replication) ✔️ ✔️ ✔️ Archive compression ✔️ ✔️ ✔️ Backup validation (checksums) ✔️ ✔️ ✔️ Retention rules ✔️ ✔️ ✔️ Blockchain backup notarization ✔️ ✔️ Bare Metal Recovery (BMR) ✔️ ✔️ ✔️ BMR on dissimilar hardware (universal restore), P2V, V2P, V2V ✔️ ✔️ ✔️ XenServer, KVM, RHV, Oracle VM Server ✔️ ✔️ Cybersecurity Protection against ransomware and cryptojacking ✔️ ✔️ ✔️ ✔️ Antivirus and anti-malware protection ✔️ ✔️ ✔️ Exploit prevention ✔️ ✔️ URL filtering ✔️ ✔️ ✔️ URL filtering with categorization ✔️ ✔️ Windows Defender antivirus management ✔️ ✔️ ✔️ Managing Microsoft Security Essentials ✔️ ✔️ ✔️ Threat Alerts ✔️ ✔️ ✔️ Remote deletion of devices ✔️ ✔️ ✔️ Hard disk condition monitoring ✔️ ✔️ Data protection map ✔️ ✔️ Continuous data backup ✔️ Forensic backup ✔️ Secure restoration of backups ✔️ Enterprise Approval List ✔️ Vulnerability assessments for Windows ✔️ ✔️ ✔️ ✔️ Vulnerability assessments for third-party Windows applications ✔️ ✔️ ✔️ ✔️ Vulnerability assessments for macOS ✔️ ✔...

    Price: 173.05 £ | Shipping*: 0.00 £
  • Acronis Cyber Protect Standard Windows Server Essentials
    Acronis Cyber Protect Standard Windows Server Essentials

    Acronis Cyber Protect Standard Windows Server Essentials lets you back up Windows Server Foundation and Essentials (and older SBS versions), including applications running on them. The version is not suitable for Windows Server Standard and Datacenter. Cyber Protect Standard Edition provides the standard backup features plus comprehensive cyber protection features (including Continuous Protection, Data Protection Map, HDD monitoring). Includes 150 GB of cloud storage per license. Acronis Cyber Protect Standard Windows Server Essentials buying points Cyber Security and Endpoint Protection Endpoint protection management including vulnerability assessment and patch management, remote desktop and drive status checks. Malware Protection Comprehensive AI-based next-generation malware protection, including URL filtering and automated backup scanning. Backup and recovery Fast and reliable recovery for your applications, systems and data on all devices to protect against any incident. Features of Acronis Cyber Protect Standard Windows Server Essentials Windows Server Essentials and Foundation backup Bare metal and granular recovery of individual elements of Windows Server (2012/2012R2/2016) Foundation and Essentials, as well as older Windows Small Business Server editions (2003/2003R2/2008/2011). Microsoft Exchange, SQL, SharePoint and Active Directory backup Supports backup of running Exchange, SQL, SharePoint and Active Directory databases. Backup to local disks, NAS and SAN Supports backups to local disks or network-based storage systems (NAS, SAN). Acronis Universal Restore Restore Windows systems to different platforms (other hardware, hypervisor, cloud). Acronis Active Protection Detects suspicious changes to data, backups and Acronis agents. These are blocked and reset. This protects data and systems from ransomware attacks. Variable block size deduplication Built-in deduplication reduces storage consumption and/or network traffic. Bare Metal Recovery Restore complete systems from an image backup, without rebooting the operating system, installing programs, configuring settings, etc. Intelligent Backup Schedule Automatically adjusts patch, scan and backup processes to current CPOC messages. Continuous Data Protection (CDP) Prevent even the smallest data loss in critical applications with Continuous Data Protection (CDP). Failsafe Patching Automatically backup endpoints before installing patches for immediate rollback. Data Protection Card Monitor the protection status of files using classification, reporting and analysis of unstructured data. Acronis Cyber Protect editions comparison Features Essentials Standard Advanced Backup Advanced Data Protection File level backup ✔️ ✔️ ✔️ ✔️ Image-based backup ✔️ ✔️ ✔️ Local backup ✔️ ✔️ ✔️ ✔️ Mobile backup ✔️ ✔️ Cloud deployment only NAS/share backup ✔️ ✔️ ✔️ Incremental/differential backups ✔️ ✔️ ✔️ ✔️ Backup Window (traffic throttling) ✔️ ✔️ ✔️ Multi-target backups (backup replication) ✔️ ✔️ ✔️ Archive compression ✔️ ✔️ ✔️ Backup validation (checksums) ✔️ ✔️ ✔️ Retention rules ✔️ ✔️ ✔️ Blockchain backup notarization ✔️ ✔️ Bare Metal Recovery (BMR) ✔️ ✔️ ✔️ BMR on dissimilar hardware (universal restore), P2V, V2P, V2V ✔️ ✔️ ✔️ XenServer, KVM, RHV, Oracle VM Server ✔️ ✔️ Cybersecurity Protection against ransomware and cryptojacking ✔️ ✔️ ✔️ ✔️ Antivirus and anti-malware protection ✔️ ✔️ ✔️ Exploit prevention ✔️ ✔️ URL filtering ✔️ ✔️ ✔️ URL filtering with categorization ✔️ ✔️ Windows Defender antivirus management ✔️ ✔️ ✔️ Managing Microsoft Security Essentials ✔️ ✔️ ✔️ Threat Alerts ✔️ ✔️ ✔️ Remote deletion of devices ✔️ ✔️ ✔️ Hard disk condition monitoring ✔️ ✔️ Data protection map ✔️ ✔️ Continuous data backup ✔️ Forensic backup ✔️ Secure restoration of backups ✔️ Enterprise Approval List ✔️ Vulnerability assessments for Windows ✔️ ✔️ ✔️ ✔️ Vulnerability assessments for third-party Windows applications ✔️ ✔️ ✔️ ✔️ Vulnerability assessments for macOS ✔️ ✔...

    Price: 346.86 £ | Shipping*: 0.00 £
  • Acronis Cyber Protect Standard Virtual Host
    Acronis Cyber Protect Standard Virtual Host

    Acronis Cyber Protect Standard Virtual Host lets you back up VMware and Microsoft virtualization hosts and all VMs running on them, including running applications (Exchange, SQL Server, SharePoint and Active Directory). Cyber Protect Standard Edition provides standard backup capabilities as well as comprehensive cyber protection features (including Continuous Protection, Data Protection Map, disk monitoring). Includes 250 GB of cloud storage per license. Acronis Cyber Protect Standard Virtual Host selling points Cyber Security and Endpoint Protection Endpoint protection management including vulnerability assessment and patch management, remote desktop and drive status checks. Malware Protection Comprehensive AI-based next-generation malware protection, including URL filtering and automated backup scanning. Backup and recovery Fast and reliable recovery for your applications, systems and data on all devices to protect against any incident. Features with Acronis Cyber Protect Standard Virtual Host VMware vSphere ESXi and Microsoft Hyper-V Server backup Agentless backup of VMs, bare metal and granular recovery of hosts and individual items from VMware ESX(i) or Microsoft Hyper-V environments. Microsoft Exchange, SQL, SharePoint and Active Directory backup Supports backup of running Exchange, SQL, SharePoint and Active Directory databases. Microsoft Azure and Amazon EC2 cloud workloads Support backups for Azure and Amazon EC2 cloud workloads. Backup to local disks, NAS and SAN Supports backups to local disks or network-based storage systems (NAS, SAN). Acronis Universal Restore Restores Windows and Linux systems to different platforms (other hardware, hypervisor, cloud). Acronis Active Protection Detects suspicious changes to data, backups and Acronis agents. These are blocked and reset. This protects data and systems from ransomware attacks. Bare Metal Recovery Restores complete systems from an image backup without rebooting the operating system, installing programs, configuring settings, etc. Intelligent backup schedule Automatically adjusts patch, scan, and backup processes to current CPOC messages. Continuous Data Protection (CDP) With Continuous Data Protection (CDP) you avoid even the smallest data loss for important applications Failsafe Patching Automatically back up endpoints before installing patches for immediate rollback Data Protection Card Monitor file protection status with classification, reporting and analysis of unstructured data. Compare Acronis Cyber Protect editions Features Essentials Standard Advanced Backup Advanced Data Protection File level backup ✔️ ✔️ ✔️ ✔️ Image-based backup ✔️ ✔️ ✔️ Local backup ✔️ ✔️ ✔️ ✔️ Mobile backup ✔️ ✔️ Cloud deployment only NAS/share backup ✔️ ✔️ ✔️ Incremental/differential backups ✔️ ✔️ ✔️ ✔️ Backup Window (traffic throttling) ✔️ ✔️ ✔️ Multi-target backups (backup replication) ✔️ ✔️ ✔️ Archive compression ✔️ ✔️ ✔️ Backup validation (checksums) ✔️ ✔️ ✔️ Retention rules ✔️ ✔️ ✔️ Blockchain backup notarization ✔️ ✔️ Bare Metal Recovery (BMR) ✔️ ✔️ ✔️ BMR on dissimilar hardware (universal restore), P2V, V2P, V2V ✔️ ✔️ ✔️ XenServer, KVM, RHV, Oracle VM Server ✔️ ✔️ Cybersecurity Protection against ransomware and cryptojacking ✔️ ✔️ ✔️ ✔️ Antivirus and anti-malware protection ✔️ ✔️ ✔️ Exploit prevention ✔️ ✔️ URL filtering ✔️ ✔️ ✔️ URL filtering with categorization ✔️ ✔️ Windows Defender antivirus management ✔️ ✔️ ✔️ Managing Microsoft Security Essentials ✔️ ✔️ ✔️ Threat Alerts ✔️ ✔️ ✔️ Remote deletion of devices ✔️ ✔️ ✔️ Hard disk condition monitoring ✔️ ✔️ Data protection map ✔️ ✔️ Continuous data backup ✔️ Forensic backup ✔️ Secure restoration of backups ✔️ Enterprise Approval List ✔️ Vulnerability assessments for Windows ✔️ ✔️ ✔️ ✔️ Vulnerability assessments for third-party Windows applications ✔️ ✔️ ✔️ ✔️ Vulnerability assessments for macOS ✔️ ✔️ ✔️ Vulnerability assessments for Linux ✔️ ✔️ ✔️ ✔️ Patch...

    Price: 354.08 £ | Shipping*: 0.00 £
  • Acronis Cyber Protect Standard Server
    Acronis Cyber Protect Standard Server

    Acronis Cyber Protect Standard Server lets you back up Windows and Linux servers, including the applications running on them. Cyber Protect Standard Edition provides standard backup capabilities as well as comprehensive cyber protection features (including Continuous Protection, Data Protection Map, HDD monitoring). Includes 250 GB of cloud storage per license. Acronis Cyber Protect Standard Server selling points Cyber Security and Endpoint Protection Endpoint protection management including vulnerability assessment and patch management, remote desktop and drive status checks. Malware Protection Comprehensive AI-based next-generation malware protection, including URL filtering and automated backup scanning. Backup and recovery Fast and reliable recovery for your applications, systems and data on all devices to protect against any incident. Features included in Acronis Cyber Protect Standard Server Windows and Linux server backup Bare metal and granular recovery of individual elements of Windows and Linux servers. Microsoft Exchange, SQL, SharePoint and Active Directory backup Supports backup of running Exchange, SQL, SharePoint and Active Directory databases. Backup to local disks, NAS and SAN Supports backup to local disks or network-based storage systems (NAS, SAN). Acronis Universal Restore Restore Windows and Linux systems to different platforms (other hardware, hypervisor, cloud). Acronis Active Protection Detects suspicious changes to data, backups and Acronis agents. These are blocked and reset. This protects data and systems from ransomware attacks. Bare Metal Recovery Restore complete systems from an image backup without restarting the OS, installing programs, configuring settings, etc. Customizable dashboards Keep track of and respond to issues faster with customizable dashboards Intelligent backup schedule Automatically adjust patch, scan, and backup processes based on current CPOC messages Continuous Data Protection (CDP) Prevent even the smallest data loss from critical applications with Continuous Data Protection (CDP). Failsafe Patching Automatically backup endpoints before applying patches for immediate rollback Data Protection Card Monitor file protection status with classification, reporting and analysis of unstructured data. Compare Acronis Cyber Protect editions Features Essentials Standard Advanced Backup Advanced Data Protection File level backup ✔️ ✔️ ✔️ ✔️ Image-based backup ✔️ ✔️ ✔️ Local backup ✔️ ✔️ ✔️ ✔️ Mobile backup ✔️ ✔️ Cloud deployment only NAS/share backup ✔️ ✔️ ✔️ Incremental/differential backups ✔️ ✔️ ✔️ ✔️ Backup Window (traffic throttling) ✔️ ✔️ ✔️ Multi-target backups (backup replication) ✔️ ✔️ ✔️ Archive compression ✔️ ✔️ ✔️ Backup validation (checksums) ✔️ ✔️ ✔️ Retention rules ✔️ ✔️ ✔️ Blockchain backup notarization ✔️ ✔️ Bare Metal Recovery (BMR) ✔️ ✔️ ✔️ BMR on dissimilar hardware (universal restore), P2V, V2P, V2V ✔️ ✔️ ✔️ XenServer, KVM, RHV, Oracle VM Server ✔️ ✔️ Cybersecurity Protection against ransomware and cryptojacking ✔️ ✔️ ✔️ ✔️ Antivirus and anti-malware protection ✔️ ✔️ ✔️ Exploit prevention ✔️ ✔️ URL filtering ✔️ ✔️ ✔️ URL filtering with categorization ✔️ ✔️ Windows Defender antivirus management ✔️ ✔️ ✔️ Managing Microsoft Security Essentials ✔️ ✔️ ✔️ Threat Alerts ✔️ ✔️ ✔️ Remote deletion of devices ✔️ ✔️ ✔️ Hard disk condition monitoring ✔️ ✔️ Data protection map ✔️ ✔️ Continuous data backup ✔️ Forensic backup ✔️ Secure restoration of backups ✔️ Enterprise Approval List ✔️ Vulnerability assessments for Windows ✔️ ✔️ ✔️ ✔️ Vulnerability assessments for third-party Windows applications ✔️ ✔️ ✔️ ✔️ Vulnerability assessments for macOS ✔️ ✔️ ✔️ Vulnerability assessments for Linux ✔️ ✔️ ✔️ ✔️ Patch Management ✔️ ✔️ Failsafe patching: securing the endpoint before installing patches ✔️ Remote desktop ✔️ ✔️ ✔️ &nb...

    Price: 317.95 £ | Shipping*: 0.00 £
  • Azure Active Directory Premium P2 (NCE)
    Azure Active Directory Premium P2 (NCE)

    Azure Active Directory Premium P2 (NCE) (CFQ7TTC0LFK5:0001)

    Price: 76.57 £ | Shipping*: 0.00 £
  • Azure Active Directory Premium P1 (NCE)
    Azure Active Directory Premium P1 (NCE)

    Azure Active Directory Premium P1 (NCE) (CFQ7TTC0LFLS:0002)

    Price: 51.28 £ | Shipping*: 0.00 £
  • ESET Secure Authentication
    ESET Secure Authentication

    Optimal protection of your data thanks to mobile-based multi-factor authentication What is multi-factor authentication? Multi-factor authentication (MFA), often referred to as two-factor authentication (2FA), is a strong authentication method that requires users to identify themselves with more than one element. By combining a static password with a dynamic second factor, the risk of data loss is greatly reduced. ESET Secure Authentication (ESA) provides a foundation for organizations to meet compliance requirements and proactively prevent data protection incidents. With ESA, organizations of any size can easily implement MFA for shared systems (Windows logins and servers, Microsoft cloud services such as Microsoft 365 or OWA, SAML, FIDO, ADFS 3.0, VPN and RADIUS-based services). The Solution: ESET Secure Authentication Powerful, easy-to-deploy multi-factor authentication for businesses of all sizes. Companies enjoy the following benefits: Prevention of data protection incidents. Fulfillment of compliance requirements Centralized control via browser Can be operated via cell phone or existing HW tokens Two-factor authentication made easy Authentication is simple: just confirm the code via your cell phone. Works on iOS and Android smartphones and for all platforms and services. Cloud support In addition to protecting local apps, ESET Secure Authentication can also be used to protect web and cloud services such as Microsoft Office 365, Google Apps, Dropbox and many others by integrating the ADFS 3.0 or SAML protocol. Various authentication methods ESET Secure Authentication supports push notifications, one-time password provisioning via the mobile client application, SMS or existing hardware tokens, as well as FIDO-based sticks and custom methods. Sample applications PROBLEM It is not uncommon for employees to use the same passwords for different applications and websites. A high security risk for organizations. SOLUTION Further secure access to corporate resources with two-factor authentication. By using multi-factor authentication, insecure or stolen passwords are no longer a problem. ESET Secure Authentication Feautures Remote Management ESET Secure Authentication uses a specially designed management console accessible through a web browser. You can choose to integrate with Active Directory, but you can also use the solution in environments without Active Directory. Once installed, no additional training or professional services are required to configure and deploy ESET Secure Authentication. Setup in just 10 minutes We designed the solution to be easy to install and deploy, even in small businesses without an internal IT department. Regardless of the size of your business, installing ESET Secure Authentication takes very little time thanks to the ability to configure multiple users at once. No additional hardware required ESET Secure Authentication does not require any additional hardware. Once the 10 MB application is installed on your server, you can start using it immediately. Compatibility with all major smartphones Your employees can continue to use the smartphones they already use. No additional hardware is required for ESET Secure Authentication. We also support hardware keys, but that's optional. Includes SDK and API We provide both an SDK and an API to customize the functionality. This allows organizations to extend ESET Secure Authentication to meet their needs and extend it to their own applications or web services. Push authentication Convenient authentication without entering a one-time password by confirming via push notification. Works on iOS and Android smartphones. With ESET Secure Authentication you protect: VPN access to your company Remote Desktop Protocol (RDP) Additional authentication for desktop logins (logging in to the operating system) Web/cloud services via Microsoft ADFS 3.0, e.g. Office 365 Online Web App (OWA) Microsoft Web Apps VMware Horizon View RADIUS-based services Exchange Control Panel & Exchange Administrator Center Supported VPNs Barracuda Cisco ASA Citrix Access Gateway Citrix NetScaler Check Point Software Cyberoam, F5 FirePass Fortinet FortiGate Juniper Palo Alto SonicWall System Requirements Server: 32-bit and 64-bit versions of Microsoft Windows Server 2003, 2003 R2, 2008, 2008 R2, 2012, 2012 R2, 2016. Client: iOS (iPhone), Android, Windows 10 Mobile. Token support: Although hardware tokens are not required, the solution supports all event-based, OATH-compliant HOTP tokens, as well as FIDO2 and FID...

    Price: 28.87 £ | Shipping*: 0.00 £
  • Acronis Cyber Backup Advanced Workstation
    Acronis Cyber Backup Advanced Workstation

    IT can ensure business continuity with Acronis Cyber Backup Advanced Vulnerability assessment Identify vulnerabilities before attackers find them Identify the vulnerability of your systems Mitigate potential threats Optimize your security investments Automatic machine detection and remote agent installation Network-based machine detection Active Directory-based machine discovery Import a list of machines from a file Assign protection plans automatically Batch-based remote agent installation using a special wizard (Discovery Wizard) Backup and Recovery Quickly and reliably recover your applications, systems and data - on any device and after any incident Antimalware Comprehensive, next-generation AI-based malware protection-including URL filtering and automated backup scanning for malware Cyber Security and Endpoint Management Endpoint Protection Management: vulnerability assessments and patch management, remote desktop functionality, and disk integrity monitoring Comprehensive data protection, now and in the future Acronis Cyber Backup can back up any data source on more than 20+ platforms - whether virtual, physical, cloud or mobile, and regardless of the size or location of the data. And even if your data volumes grow or your infrastructure evolves, flexible, scalable storage and easy backup management keep backing up your enterprise data a breeze. Full availability without downtime Acronis Cyber Backup enables continuous business operations by ensuring your data is always available. With our proactive protection against ransomware attacks based on artificial intelligence and machine learning, and lightning-fast restores, you can meet even the shortest RTO requirements and avoid operational disruptions, lost productivity, and costly downtime caused by malware infections or costly recovery efforts. Automated Dual Protection Create local backups and replicate them to the cloud simultaneously. This ensures that you always have a secure offsite copy of your data available for recovery. Tray Notification Center Notifications displayed in the desktop tray make it easier to monitor the status of your backups and resolve issues faster. Custom Power Management Manage your notebook backups more efficiently so they don't drain your battery too much. You can block battery backups completely or allow them only above a certain battery level. Backup only via selected WLANs You should be able to perform backups securely from any location if possible. You can now easily exclude paid connections or insecure public WLANs. Improved restores from the cloud Benefit from even faster performance and a more intuitive user experience. The navigation in the program has also been improved again. Efficient all-in-one protection Are you using multiple solutions to back up and protect your data? If so, you're probably paying quite a bit for a patchwork solution that can also create gaps in your defenses. Acronis Cyber Backup combines powerful data protection, cyber security and numerous other features into one integrated solution that you can manage and control from a central, intuitive interface. Versatile Back up what you want and how you want with features like backup of drives/files/folders, cloning of active drives, cloud-to-cloud backup of Office 365 accounts, event-based backup scheduling, non-stop backup, and automatic replication of local backups to the cloud. Flexible Control where you want to store your data: on local hard drives, network folders, NAS devices, offsite in the cloud, or even a combination of these for comprehensive data protection. Trust specific Wi-Fi connections to avoid data risk when uploading to the cloud. Clearly arranged Know everything about your backups at a glance. Notifications that appear in your desktop bar make it easier to monitor backup status. Our clear dashboard informs you about important parameters such as file sizes, backup speeds or the type of data backed up (with a color-coded display). Compatible Back up your data no matter where it is. Our solution supports all current Windows PCs, Macs, mobile devices (iOS, Android) and virtual machines. The built-in malware defense is 100% compatible with popular antivirus programs. Data management and access made easy The need for data confidentiality and security is greater than ever. Acronis Cyber Backup ensures your data is for your eyes only with innovative technologies. End-to-end encryption You can reliably protect your data from prying eyes with password and AES-256 encryption during storage and transfers (whether on your local PC or in the cloud). Secure data centers Store your offsite backup in the secure Acronis Cloud. Our data centers are SSAE-16 and Tier III certified, so they meet the highest security and availability standards. Blockchain Certification Create a unique blockchain-based digital fingerprint of your data. You can then use this later to verify that...

    Price: 54.17 £ | Shipping*: 0.00 £

Similar search terms for Incident:


  • 'I'm sorry about the incident.'

    Thank you for your apology. It means a lot to me that you acknowledge the incident and are willing to address it. I appreciate your understanding and willingness to make things right. Let's work together to find a resolution and move forward positively.

  • What was the incident back then?

    The incident back then refers to a specific event or occurrence that took place in the past. Without further context, it is unclear what incident is being referred to. It could be anything from a car accident to a political scandal to a natural disaster. More information would be needed to provide a specific answer.

  • What is the incident with Elliot Gindi?

    Elliot Gindi is a high school runner who gained attention for his sportsmanship during a race in 2019. In a cross-country race, Gindi stopped to help a competitor who had collapsed near the finish line, sacrificing his own chance of winning the race. His act of kindness and selflessness was widely praised and showcased the true spirit of sportsmanship. Gindi's actions serve as a powerful reminder of the importance of compassion and empathy in competitive sports.

  • How can one report a scamming incident?

    If you have been a victim of a scamming incident, you can report it to the appropriate authorities such as the Federal Trade Commission (FTC), your local police department, or the Better Business Bureau (BBB). Provide as much information as possible about the scam, including any communication or documentation you have received. It is important to report the incident promptly to increase the chances of catching the scammers and preventing others from falling victim to the same scam.

  • What is the incident with my aunt?

    I'm sorry, but I don't have any specific information about the incident with your aunt. If you could provide more details or context, I would be happy to help answer your question to the best of my ability.

  • Can this incident be considered as bullying?

    Yes, this incident can be considered as bullying. Bullying is defined as repeated aggressive behavior intended to hurt, intimidate, or harm another person. In this case, the repeated teasing and name-calling directed towards the individual with a stutter can be seen as a form of bullying. The behavior is causing emotional distress and creating a hostile environment for the individual, which aligns with the characteristics of bullying.

  • What is the incident involving Elliot Gindi?

    Elliot Gindi is a professional runner who gained attention for an incident during a race in 2021. While competing in the 5000m at the Sound Running Track Meet in California, Gindi was leading the race when he mistakenly thought he had completed the required distance and stopped running. This allowed his competitors to pass him, and he ultimately finished in 10th place. The incident sparked a debate about the importance of staying focused and aware during races, even when leading.

  • What is your assessment of this incident?

    This incident is concerning as it involves a breach of privacy and trust. The employee's actions were unethical and could have serious consequences for both the company and the affected individuals. It is important for organizations to have strict policies in place regarding the handling of sensitive information to prevent such incidents from occurring in the future. Swift and appropriate action should be taken to address the situation and prevent similar breaches in the future.

  • What is the incident in public transportation?

    An incident in public transportation refers to any unexpected event or occurrence that disrupts the normal operation of public transportation services. This can include accidents, mechanical failures, delays, disruptions, or any other event that impacts the safety, efficiency, or reliability of public transportation. Incidents in public transportation can cause inconvenience for passengers and may require the intervention of transportation authorities or emergency services to resolve.

  • How should I behave after this incident?

    After this incident, it's important to take responsibility for your actions and apologize if necessary. It's also important to learn from the experience and make any necessary changes to prevent a similar incident from happening in the future. Additionally, it's important to communicate openly and honestly with anyone who may have been affected by the incident and work towards rebuilding trust and repairing any damage that may have been caused. Finally, it's important to move forward with integrity and a renewed commitment to making better choices in the future.

  • What was the incident at the disco?

    The incident at the disco was a tragic fire that broke out in a popular nightclub, resulting in the loss of many lives and injuries to numerous others. The fire was caused by an electrical fault and spread rapidly due to the flammable materials in the club. The incident led to a large-scale rescue operation and raised concerns about fire safety regulations in public venues.

  • What is the wrap incident with 45?

    The "wrap incident with 45" likely refers to an incident involving the 45th President of the United States, Donald Trump, and a wrap, which could be a reference to a food item or a type of vehicle wrap. Without more context, it is difficult to provide a specific answer. If the wrap refers to a food item, it could be a lighthearted or humorous incident involving the president and a wrap sandwich or similar food. If the wrap refers to a vehicle wrap, it could be related to a specific event or controversy involving the president and a vehicle with a wrap design.

* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.